- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
10-10-2025 08:10 AM - edited 10-10-2025 08:10 AM
What is the best practice method to block iCloud relay without impacting iOS users too much? Apple says to NXDOMAIN the following below.
mask.icloud.com
mask-h2.icloud.com
Prepare your network or web server for iCloud Private Relay - iCloud - Apple Developer
For the PA though,... should we... create a policy to block, deny or use a URL custom block object rule?
These are some other domains/FQDN I have found:
10-12-2025 01:28 PM - edited 10-12-2025 01:43 PM
Hi @phampx ,
I would recommend leveraging dns sinkholing at the Palo instead of nxdomain at the DNS level. You can accomplish this via an EDL (Domain List) tied to an AS profile that is referenced in a security policy. DNS sinkholing via the Palo achieves the same effect, but with visibility and logging, which you don't get at the DNS level. Also, DNS sinkholing over URL Filtering/ FQDN-based blocking is efficient in that the fw stops the request at DNS lookup so it doesn’t need to build a full session compared to URL Filtering/fqdn object.
**Side Note (if you choose to block via Security Policy instead of Sinkhole)...
Blocking via FQDN objects in a security policy would be simpler and have the same effect as URL Filtering in this case since you're not needing wildcards and only targeting domains like "mask.icloud.com" and "mask-h2.icloud.com", rather than something like mask.icloud.com/private-relay/api/init. Full URL path-based blocking would require url filtering w/ SSL decryption to inspect the HTTP path inside the TLS session.
10-16-2025 07:24 AM
If this is for managed devices you can simply set allowCloudPrivateRelay and it will ensure that it is disabled on the device itself which is the most effective way to manage things.
If you block mask.icloud.com or mask-h2.icloud.com on devices that you don't manage, this will cause noticeable impact to your Apple endpoints. There's no way around this block triggering a delay for these endpoints; Apple has made changes so that blocking these requests doesn't cause as big of an impact as it did initially when this feature launched, but people will still notice 'slowness' since it will always attempt to utilize Private Relay first and then need to fallback to normal communication.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!